Local systems can eliminate vulnerabilities by patching systems and software effectively and continuously. Patching is the process of applying updates or fixes to software or hardware components that have known vulnerabilities or bugs. Patching can prevent attackers from exploiting these vulnerabilities and compromising the security or functionality of the systems. Patching should be done regularly and promptly, as new vulnerabilities are constantly discovered and exploited by cybercriminals. Patching should also be done effectively, meaning that the patches are tested and verified before deployment, and that they do not introduce new vulnerabilities or issues. Patching should also be done continuously, meaning that the systems are monitored for new vulnerabilities and patches are applied as soon as they are available. Continuous patching can reduce the window of opportunity for attackers to exploit unpatched vulnerabilities and cause damage or data breaches. References:
•1: What is Patch Management? | Palo Alto Networks
•2: Patch Management Best Practices: How to Keep Your Systems Secure | Snyk
•3: Vulnerability Remediation Process - 4 Steps to Remediation | Snyk
Questions 5
Based on how much is managed by the vendor, where can CaaS be situated in the spread of cloud computing services?
CaaS, or Containers-as-a-Service, is a cloud service that allows users to manage and deploy applications using containers and clusters. CaaS can be situated between IaaS and PaaS in the spread of cloud computing services, based on how much is managed by the vendor. IaaS, or Infrastructure-as-a-Service, provides the lowest level of abstraction, where users have to manage the servers, storage, network, and operating system. PaaS, or Platform-as-a-Service, provides a higher level of abstraction, where users only have to manage the application code and data. FaaS, or Function-as-a-Service, provides the highest level of abstraction, where users only have to manage the functions or logic of the application. CaaS falls in between IaaS and PaaS, as it provides users with more control over the container orchestration and configuration than PaaS, but also simplifies the infrastructure management and scaling than IaaS123. References:
What is CaaS? from Red Hat
Containers as a Service from Atlassian
Container as a Service (CaaS) from GeeksforGeeks
Questions 6
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
Endpoint antivirus software is a type of software designed to help detect, prevent, and eliminate malware on devices, such as laptops, desktops, smartphones, and tablets. Endpoint antivirus software can block viruses that are not seen and blocked by the perimeter firewall, which is a network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules. Perimeter firewall can block some known viruses, but it may not be able to detect and stop new or unknown viruses that use advanced techniques to evade detection. Endpoint antivirus software can provide an additional layer of protection by scanning the files and processes on the devices and using various methods, such as signatures, heuristics, behavior analysis, and cloud-based analysis, to identify and remove malicious code123. References:
What Is Endpoint Antivirus? Key Features & Solutions Explained - Trellix
Microsoft Defender for Endpoint | Microsoft Security
Download ESET Endpoint Antivirus | ESET
Questions 7
Which statement is true about advanced persistent threats?
Options:
A.
They use script kiddies to carry out their attacks.
B.
They have the skills and resources to launch additional attacks.
C.
They lack the financial resources to fund their activities.
An advanced persistent threat (APT) is a sophisticated, sustained cyberattack in which an intruder establishes an undetected presence in a network in order to steal sensitive data over a prolonged period of time. APTs are usually carried out by well-funded, experienced teams of cybercriminals that target high-value organizations, such as governments, military, or corporations. APTs have the skills and resources to launch additional attacks, as they often use advanced techniques to evade detection, move laterally within the network, and establish multiple entry points and backdoors. APTs are not interested in causing immediate damage or disruption, but rather in achieving long-term goals, such as espionage, sabotage, or theft of intellectual property. Therefore, option B is the correct answer among the given choices123 References: